The report discusses heterogeneous database systems. It defines a heterogeneous database as a system that integrates different, disparate database management systems to provide a single interface. It describes the key components of heterogeneous databases including an integration layer that allows transparent access to multiple underlying databases. The report also outlines some of the challenges of heterogeneous databases like schema and data conflicts, and discusses potential solutions like schema mapping. It provides advantages like improved data sharing and disadvantages like increased complexity.
DBMS Vs TRADITIONAL FILES COMPARISON, DBMS ADVANTAGES AND DISADVANTAGES, CLASSIC FILE BASED SYSTEM, ADVANTAGES AND DISADVANTAGES OF CLASSICAL TECHNIQUE
This presentation several topics of subjects RDBMS and DBMS including Distributed Database Design,Architecture of Distributed database processing system,Data Communication concept,Concurrency control and recovery. All the topics are briefly described according to syllabus of BCA II and BCA III year subjects.
DBMS Vs TRADITIONAL FILES COMPARISON, DBMS ADVANTAGES AND DISADVANTAGES, CLASSIC FILE BASED SYSTEM, ADVANTAGES AND DISADVANTAGES OF CLASSICAL TECHNIQUE
This presentation several topics of subjects RDBMS and DBMS including Distributed Database Design,Architecture of Distributed database processing system,Data Communication concept,Concurrency control and recovery. All the topics are briefly described according to syllabus of BCA II and BCA III year subjects.
DDBMS, characteristics, Centralized vs. Distributed Database, Homogeneous DDBMS, Heterogeneous DDBMS, Advantages, Disadvantages, What is parallel database, Data fragmentation, Replication, Distribution Transaction
Knowledge Management systems are the set of processes developed in an organization to create, gather, store, maintain, and disseminate the firm's knowledge.
Dbms architecture
Three level architecture is also called ANSI/SPARC architecture or three schema architecture
This framework is used for describing the structure of specific database systems (small systems may not support all aspects of the architecture)
In this architecture the database schemas can be defined at three levels explained in next slide
DDBMS, characteristics, Centralized vs. Distributed Database, Homogeneous DDBMS, Heterogeneous DDBMS, Advantages, Disadvantages, What is parallel database, Data fragmentation, Replication, Distribution Transaction
Knowledge Management systems are the set of processes developed in an organization to create, gather, store, maintain, and disseminate the firm's knowledge.
Dbms architecture
Three level architecture is also called ANSI/SPARC architecture or three schema architecture
This framework is used for describing the structure of specific database systems (small systems may not support all aspects of the architecture)
In this architecture the database schemas can be defined at three levels explained in next slide
Data can be defined as raw facts and figures that can be organized later on. Database is the collection of coherent meaningful data. The full form of DBMS is Database Management System. It is the grouping of related data, records whereas management system is the collection of programs for saving and retrieving the data records. DBMS can be defined as collection of programs which are required to store as well as access the data in efficient and easy way. Copy the link given below and paste it in new browser window to get more information on Database Management System:- http://www.transtutors.com/homework-help/computer-science/database-management-system.aspx
Heterogeneous Systems Architecture: The Next Area of Computing Innovation AMD
Dr. Lisa Su, Senior Vice President and GM, Global Business Units, AMD keynote from ISSCC on Heterogeneous Systems Architecture: The Next Area of Computing Innovation - Case Study, The Holodeck.
It includes:
Introduction to Database Management System
DBMS vs File System
View of data
Data models
Database Languages: DML, DDL
Database users and administrators
Transaction Management
Database System Structure
Application architectures
An perspective into the raise of NoSQL systems and an comparison between RDBMS and NoSQL technologies.
The basic idea of the presentation originated while trying to understand the different alternatives available for managing data while building a fast, highly scalable, available, and reliable enterprise application.
Database management system is a computer software system that has been designed to manage databases, Oracle, DB2, Microsoft Access among others are examples of DBMS.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
In this paper we describe NoSQL, a series of non-relational database
technologies and products developed to address the current problems the
RDMS system are facing: lack of true scalability, poor performance on high
data volumes and low availability. Some of these products have already been
involved in production and they perform very well: Amazon’s Dynamo,
Google’s Bigtable, Cassandra, etc. Also we provide a view on how these
systems influence the applications development in the social and semantic Web
sphere.
In this paper we describe NoSQL, a series of non-relational database technologies and products developed to address the current problems the RDMS system are facing: lack of true scalability, poor performance on high data volumes and low availability. Some of these products have already been involved in production and they perform very well: Amazon’s Dynamo, Google’s Bigtable, Cassandra, etc. Also we provide a view on how these systems influence the applications development in the social and semantic Web sphere.
Adbms 28 components of distributed database systemVaibhav Khanna
• Data communications (DC) component. The data communications component is the software at each node that links it to the network.
• This DC component includes a complete description of the network’s nodes and lines.
• For each node, it identifies processing performed, storage capacity, processing power, and current state.
• For each link, it identifies the nodes it connects, type of link, bandwidth, protocols required, and the current state of the link.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. Heterogeneous Database System Presentation Report
COMSATS INSTITUTE OF INFROMATION TECHNOLOGY PARKROAD
CHAKSAHZAD CAMPUS ISLAMABAD
REPORT OF DATABASE PRESENTATION
Group Members:
(SP12-BCS-089)
Hanzla Akram
Submitted To:
Haq Nawaz
(SP12-BCS-088)
Sir Tehseen Riaz Abbasi
Submisson Date:
014 December 2013
1
Database System 271
2. Heterogeneous Database System Presentation Report
Heterogeneous Database
Definition
“A Heterogeneous Database System is an automated (or semi-automated) system for the
integration of heterogeneous, disparate database DBMS to present a user with a single,
unified query interface. Heterogeneous database systems (HDBS) are computational
models and software implementations that provide heterogeneous database integration”
Introduction and Discription
There are two main types of DDBS one is Homogeneous Database System and other one is
Heterogeneous Database System. Our report focus is on Heterogeneous Database System. HDBS
comprises a software layer (integration layer)and multiple DBSs and/or file Systems to be
integrated. Users can transparently access the integrated DBSs and/or file systems via the
interface provided by the integration layer. Defines a global data model Supports a Data
Definition Language (DDL)Supports a Data Manipulation Language (DML)Distributed
Transaction Management Transparent integration of the underlying, disparate DBS. The
integrated, local DBSs are autonomous and can also be used as stand-alone systems. Local
applications are unchanged and unknown to the HDBS.
The transformation of existing local databases to meet diverse application needs at the global
level is performed through a four-layered procedure that stresses total schema integration and
virtual integration of local databases. The proposed methodology covers both schema integration
and database integration, and uses a four-layered schema architecture (local schemata, local
object schemata, global schema, and global view schemata) with each layer presenting an
integrated view of the concepts that characterize the layer below. Mechanisms for accomplishing
this objective are presented in theoretical terms, along with a running example. Object
equivalence classes, property equivalence classes, and other related concepts are discussed in the
context of logical integration of heterogeneous schemata, while object instance equivalence
classes and property instance equivalence classes, and other related concepts are discussed for
data integration purposes. The proposed methodology resolves naming conflicts, scaling
conflicts, type conflicts, and level of abstraction, and other types of conflicts during schema
integration, and data inconsistencies during data integration
In a heterogeneous distributed database system, at least one of the databases is a nonOracle system. To the application, the heterogeneous distributed database system
appears as a single, local, Oracle database. The local Oracle database server hides the
distribution and heterogeneity of the data.
2
Database System 271
3. Heterogeneous Database System Presentation Report
The Oracle database server accesses the non-Oracle system using Oracle
Heterogeneous Services in conjunction with an agent. If you access the non-Oracle
data store using an Oracle Transparent Gateway, then the agent is a system-specific
application. For example, if you include a Sybase database in an Oracle distributed system,
then you need to obtain a Sybase-specific transparent gateway so that the Oracle databases in the
system can communicate with it.Alternatively, you can use generic connectivity to access nonOracle data stores so long as the non-Oracle system supports the ODBC or OLE DB protocols.
Sites may run different DBMS products, with possibly different underlying data models.
Occurs when sites have implemented their own databases and integration is considered
later.
Translations required to allow for:
Different hardware.
Different DBMS products.
Different hardware and different DBMS products.
Typical solution is to use gateways
.Database
Integration
• Goal: providing a uniform access to multiple heterogeneous information sources
• More than data exchange (e.g., ASCII, EDI, XML)
• Old problem, difficult, well-known (partial)Solutions
Concider Scenario Of a Movie Data Base
3
Database System 271
4. Heterogeneous Database System Presentation Report
Data Integration
• We did not directly work on it in the project; however, used different service
interfaces which requires data interchange
• Typically requires (some) manual Interaction
Diagrammatic View of HDBMS
4
Database System 271
6. Heterogeneous Database System Presentation Report
• Manually merge multiple databases into a new global database
• Time consuming and error prone
• Local autonomy lost
• Static solution
• Does not scale with number of databases
Old-School Approach Multidatabase Language Approach
• No attempt at integrating schemas
• Language (e.g., SQL) used to integrate information sources at run-time
• Not transparent (you need to know all data bases!)
• Heavy burden on (expert) users
• Global queries subject to local changes
6
Database System 271
7. Heterogeneous Database System Presentation Report
Example
Use S1, S2
Select Titre
From S1.Book, S2.Livre
Where S1.Book.ISBN = S2.Livre.ISBN
How to Deal with Autonomy?
• Problems
–changing structure of Web page
–different coverage of Web sites
–availability of services
• Solutions
–manually adapt to changes
–replication, materialization (availability)
–contacts, agreements, … standards
How to Deal with Heterogeneity?
• Problems
–Data models
–Schemas
–Data
• Solutions
–Mappings, schema integration
–Standards
7
Database System 271
10. Heterogeneous Database System Presentation Report
Advantages of HDBS
Disadvantages of HDBS
Reflects organizational structure
Cost
Improved share ability and local
autonomy
Integrity control more difficult
Improved availability
Lack of experience
Improved reliability
Database design more complex
Complexity of management and
control
Improved performance
Economics
Modular growth
Data located near site with greatest
demand
Faster data access
Lack of standards
Security
Increased storage requirements
Greater difficulty in managing data
environment
10
Database System 271
11. Heterogeneous Database System Presentation Report
Increased training costs
Faster data processing
Growth facilitation
Improved communications
Reduced operating costs
User-friendly interface
Less danger of single-point failure
Processor independence
Heterogeneous Services
Transparent Gateway Agents
Generic Connectivity
Tools and technologies
Unix
Linux
Ms.sql server 2008
My SQL 5.0
CPN
ITSE(integrated translation support environment )
Current work on the Heterogeneous database
In a heterogeneous distributed database, different sites may use different schema and software.
Difference in schema is a major problem for query processing and transaction processing. Sites
may not be aware of each other and may provide only limited facilities for cooperation in
11
Database System 271
12. Heterogeneous Database System Presentation Report
transaction processing. In heterogeneous systems, different nodes may have different hardware
& software and data structures at various nodes or locations are also incompatible. Different
computers and operating systems, database applications or data models may be used at each of
the locations. For example, one location may have the latest relational database management
technology, while another location may store data using conventional files or old version of
database management system. Similarly, one location may have the Windows NT operating
system, while another may have UNIX. Heterogeneous systems are usually used when individual
sites use their own hardware and software. On heterogeneous system, translations are required to
allow communication between different sites (or DBMS). In this system, the users must be able
to make requests in a database language at their local sites. Usually the SQL database language is
used for this purpose. If the hardware is different, then the translation is straightforward, in
which computer codes and word-length is changed. The heterogeneous system is often not
technically or economically feasible. In this system, a user at one location may be able to read
but not update the data at another location.
Future work
The heterogeneous future work is on following things
Linux operating system
Unix operating system
It also playing an important role in improving relational database system
It also modifies the performance of DBMS
Conclusion
This report is all about HDBMS its types Classification , Advantages ,disadvantages, tools and
technologies used for DDBS. Database over the web servers are distributed in parts. There are
two major categories of distributed database system one is Homogeneous And other one is
Heterogeneous databases. There are advantages of Heterogeneous database system and also
some disadvantages.
Advantages includes Reflects organizational structure, Improved share ability and local,
autonomy, Improved availability, Improved reliability, Improved performance, Economics,
Modular growth , Data located near site with greatest demand and e.t.c and some of the
disadvantages are Cost, Integrity control more difficult, Lack of standards, Lack of experience,
Database design more complex , Complexity of management and control, Security. We also
12
Database System 271
13. Heterogeneous Database System Presentation Report
discussed the tools and technologies for developing and maintaining the web based DDBS and
their modification and integration according to the need of time.
Lesson learnt
Gain knowledge about heterogeneous database system
We came to know the tools and technologies of heterogeneous database system
Learnet about distributed database system
We came to know that how much heterogenous database system is globally important.
My experience
Before this research we didn’t knew that how is data distributed in segments over the network
and how it can be access or we can say how we retrieve data by querying over the internet. We
were also don’t know that how is data managed by using different tools and their modifications
with time. The advantages and disadvantages were also unknown for us.Throughout our research
we came to know that what are Heterogeneous database And heterogeneous database system is.
Before this we were not aware of such wonderful information about database management over
the web servers. Through the research now we are able to tell what are DDBS and their types
which includes Heterogeneous Data Base Systems and Hmogeneous database system.
Review of Report
Reviewed by:
ASIM NAWAZ
Review Topic:
Heterogeneous Databases
By going through the report created by Hanzala Akram and Haq Nawaz on the topic heterogeneous
databases I observed that report is made according to the given contents of sir as sir Tehseen guided
us.The data is presented relatively according to the contents and similarity is shown in the data about
the contents of report.The things which we observed that are lacking in the report are below other wise
report is created accordingly to the given context.
The data about contents except introduction I feel is less detailed which is required.
13
Database System 271
14. Heterogeneous Database System Presentation Report
The data is not more related to the industrial base I feel some details may the report is lacking.
I think data relted to contents should be more detailed that can elaborate the complete meanings of
infromation required for the reports contents.
The advantages and disadvantages are given in tabular form in keypoints but not detailed one.
In the section tootls and technologies just the tools names are given but complete detail is not provided.
In the section future work there too just some tools are mentioned complete detail also missing .
References
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=334882&url=http%3A%2F%2Fieeexplor
e.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D334882
https://www.google.com.pk/search?q=introduction+of+heterogeneous+database&oq=introductio
n+of+heterogeneous+database&aqs=chrome..69i57j0l4.21052j0j4&sourceid=chrome&espv=210
&es_sm=93&ie=UTF-8#es_sm=93&espv=210&q=introduction+to+heterogeneous+database
http://www.slideshare.net/adorepump/distributed-databases
14
Database System 271
15. Heterogeneous Database System Presentation Report
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=334882&url=http%3A%2F%2Fieeexplore.ieee.o
rg%2Fxpls%2Fabs_all.jsp%3Farnumber%3D334882
http://docs.oracle.com/cd/B10501_01/server.920/a96521/ds_concepts.htm
15
Database System 271